BLUFThere are many different roles that are vital to a well oiled Information Security team. The Information Security Architect is just one of these important roles. Information Security ArchitectThe Information Security Architect is a more senior role that is responsible for a wide range of systems and networks. This position is in charge of creating, […]
Category: Uncategorized
Write-Up: CIA Triad
BLUFThe CIA triad is an idea that information security consists of three main components:confidentiality, integrity, and availability. This write-up will further detail the CIA triad and thedifference between authentication and authorization. The TriadThe CIA triad is made up of confidentiality, integrity, and availability. Confidentiality deals withsafeguarding personal privacy and sensitive information. Integrity has to do […]
Write-Up: Security Awareness Training Policy
Security Awareness Training Policy Purpose: The purpose of this Security Awareness Training Policy is to ensure that all employees, contractors, and relevant stakeholders are properly educated and equipped with the knowledge necessary to protect the organization’s information and technology assets. This policy outlines the framework for continuous security awareness training to reduce risks associated with cybersecurity […]
Article Review #2-The Psychological and Social Harm of Cyberbullying
Introduction and BLUF The article “Cyberbullying: Its Social and Psychological Harms Among Schoolers” talks about the effects on adolescents, that have been victims of cyberbullying, having both adult and peer support. The study conducted in the article aims to answer four separate hypotheses. All four hypotheses presented have to do with cyberbullying victims being less […]
Career Paper
Introduction and BLUF Penetration testers are the “good guys” of the hacker world, also known as ethical hackers. Their main job is to identify weaknesses and vulnerabilities within a company’s cybersecurity practices. These vulnerabilities can range from human errors and lack of cyber awareness training to technical and physical vulnerabilities (Beaver, 2025). Penetration Testers and […]
Article Review #1-The Fear of Cybercrime Risk
Introduction and BLUF The article “Cybercrime Risk Fear Among University Students’ Social Networking Sites: Validity and Reliability” discusses elements that contribute to the fear that university students feel towards cybercrime. The analysis within the article leads to research that was conducted by sending out surveys to various participants. Cybercrime Risk Fear and the Social Sciences […]